- Cloud Computing and Resource Management
- Human Pose and Action Recognition
- Distributed and Parallel Computing Systems
- Video Surveillance and Tracking Methods
- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- IoT and Edge/Fog Computing
- Gait Recognition and Analysis
- Advanced Neural Network Applications
- Face recognition and analysis
- Advanced Steganography and Watermarking Techniques
- Advanced Vision and Imaging
- Recommender Systems and Techniques
- Software System Performance and Reliability
- Human Motion and Animation
- Data Management and Algorithms
- Petri Nets in System Modeling
- Image and Signal Denoising Methods
- Cloud Data Security Solutions
- Advanced Clustering Algorithms Research
- Advanced Image and Video Retrieval Techniques
- Peer-to-Peer Network Technologies
- Text and Document Classification Technologies
- Advanced Software Engineering Methodologies
- Hand Gesture Recognition Systems
Hohai University
2015-2025
Ministry of Water Resources of the People's Republic of China
2022-2025
North China University of Technology
2024
Inner Mongolia University of Technology
2024
China Three Gorges University
2022
China Tobacco
2022
Shanghai University
2021
Ningbo University
2021
Zhejiang University
2021
Guangdong University of Finance
2014-2020
Adverse effects in the measured gamma spectrum caused by radioactive statistical fluctuations, ray scattering, and electronic noise can be reduced energy denoising. Wavelet threshold denoising used to perform multi-scale multi-resolution analysis on noisy signals with small root mean square errors high signal-to-noise ratios. However, traditional wavelet methods, there are signal oscillations hard constant deviations soft An improved calculation method processing function proposed this...
Traditional classification algorithms addressing imbalanced-class dataset mostly concentrate on the majority classes' accuracy, such that minority class's accuracy is usually ignored. Focusing this issue, we propose a novel algorithm using Ensemble Feature Selections (EFS) for dataset. This utilizes superiority of EFS in then considers diversity and imbalance designing appropriate feature subset objective function to make it fit imbalanced It chooses class-oriented F measurement computing...
Cloud computing is a recently developed new technology for complex systems with massive-scale service sharing. reliability analysis and modeling are not easy tasks because of the complexity large scale system. Due to cloud systems, models pure software/hardware or conventional networks cannot be simply applied study reliability. This paper focuses on evaluation using hybrid methods, which combine MTTF/MTTR CTMC models. We take into account only faults, but also effect physical-resource...
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The uses the MPWLCM to permute and diffuse plain simultaneously. Due sensitivity initial key values, system parameters, ergodicity in system, two pseudorandom sequences are designed used processes of permutation diffusion. order processing pixels is not accordance with index pixels, but it from beginning or end alternately. cipher feedback introduced diffusion process. Test results...
Context-aware recommender systems focus on improving recommendation accuracy by adding contextual information and have been widely used in the real-world applications. However, conventional context-aware approaches drawbacks of giving same weight to all context features, ignoring that users may different preferences contexts, effects features process recommendations be different. In this paper, we propose a multi-dimensional approach based improved random forest (MCRIRF) algorithm. The...
Cloud computing is more convenient and efficient than traditional on-premise for users, as it provides large scale resources, software, information to each customer. However, cloud systems can be easily threatened by various cyber attacks. Therefore, an Intrusion Detection System (IDS) very necessary system. There a serious problem which host-based IDS consumes amount of system resources. In this paper, we propose centralized framework reduce the use Using logstash tool collect logs from...
In recent years, cross-domain fault diagnosis problems based on knowledge transfer have attracted considerable attention from researchers, some of whom adopted domain adaptation algorithms for model under various working conditions. Such typically assume the samples target and source domains share same mode sets that are interrelated. However, such prior is difficult to obtain in actual industrial diagnoses. To address this issue, we propose a universal network consensus (CKUAN). This adopts...
Contextual information can accurately describe the user's time, location, environment, activities, use of devices, and so on. The recommender systems with contextual have better prediction accuracy, coverage, user satisfaction. However, application conventional context-aware framework in some special fields has drawbacks. For example, field cold chain logistics distribution, cannot adapt to multi-dimensional, complex dynamic contexts logistics, lack risk management, traceability cargo...
3D human action recognition is crucial in broad industrial application scenarios such as robotics, video surveillance, autonomous driving, or intellectual education, etc. In this paper, we present a new point cloud sequence network called PointMapNet for recognition. PointMapNet, two feature maps symmetrical to depth are proposed summarize appearance and motion representations from sequences. Specifically, first convert the frames virtual using static techniques. The frame 1D vector used...
Volatility is the key challenge of desktop Grid platform and character volatility mainly depends on daily behavior computer user. In this paper, a trust model (TM-DG) based Dempster-Shafer's (D-S) theory presented to predict which node more reliable according users' history information from platform. TM-DG, trustworthy degree introduced quantify node's reliability. Using Dempster's rules combination, it can be determined two bodies independent evidence: 1) percentage completion allocated...
In this paper, a robust watermarking algorithm against geometric distortions and common signal processing is proposed. This algorithm based on two method to solve the synchronization of original images test in wavelet domain watermarking. One method, which estimates rotation scaling embedding template circle middle frequency DFT, translation extracting an invariant centroid from restricted area inside image. process, watermark embedded adaptively low band DWT domain, according conceal...
At present, content-based methods are regard as the more effective in task of Short Message Service (SMS) spam filtering. However, they usually use traditional text classification technologies, which suitable to deal with normal long texts; therefore, it often faces some serious challenges, such sparse data problem and noise SMS message. In addition, existing filtering consider a binary-class problem, could not provide for different categories multi-grain this paper, authors propose message...
Net compression technologies are widely researched to avoid the problem of state explosion. Current researches transition refinement and subnet abstraction mainly paid attention preserve different attributes during transformation, usually led very strict conditions for subnet, so that application these was limited. Aiming provide same service interface after transformation as original module while less restricts given, a kind is put forward model complex manufacturing system. The concept...
Person re-identification (ReID), aiming to identify people among multiple camera views, has attracted an increasing attention due the potential of application in surveillance security. Large variations subjects' postures, view angles, and illuminating conditions as well non-ideal human detection significantly increase difficulty person ReID. Learning a robust metric for measuring similarity between different images is another under-addressed problem. In this paper, following recent success...